Assetspire Limited


Assetspire's highly-configurable Spire™ asset management platform enables fast and accurate capture of any business asset. Spire™ is intelligently engineered to ensure data is captured and maintained quickly and accurately, serving as a central data management solution across DCIM, CAFM and CMDB environments. Intuitive asset Management for all business assets


  • Live dashboard of all your business assets
  • Intuitive Mobile app with simple process for maintaining accurate data
  • Unlimited locations and assets can be managed with unrestricted license
  • Product library to manage asset volume in a standardised approach
  • Quick process for initial data collection & ongoing data upkeep
  • Full audit trail of what was done by who
  • Vendor SLA tracking with live alerts
  • Stock control management for any assets
  • Asset utilisation reporting ensuring assets in stock are used
  • Barcode and track assets quickly with GS1 tagging.


  • Immediate visibility of what assets you have
  • Instant view of data and reporting
  • Mobile app for intuitive updating data
  • Full audit trail by user, time&action stamped, with appended photos
  • Automated dashboards and reports
  • Efficient process to manage all assets
  • Any type of assets and locations.
  • Single source of truth data
  • Planned Preventative Maintenance Management
  • Full Asset Lifecycle management including financial management


£12,480.00 a licence a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

4 3 8 4 9 0 2 6 7 5 9 8 7 0 2


Assetspire Limited Steven Beber
Telephone: 07779263010

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
It can be integrated with other asset management solutions, smart building technology solutions and other monitoring solutions.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
System requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
5 Days a week 09.00-17:00hrs support
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
The webchat is a new addition to our support site and as of yet has not been through testing for assistive technology users.
Onsite support
Onsite support
Support levels
Included in license: Monday to Friday 9 to 5 TICKET RESPONSE TIMES tiered support covering: URGENT - RESPONSE WITHIN 1 HOUR, HIGH - RESPONSE WITHIN 4 HOURS, MEDIUM RESPONSE WITHIN 8 HOURS, LOW RESPONSE WITHIN 2 DAYS Additional support option to cover weekend working at extra charge.
Support available to third parties

Onboarding and offboarding

Getting started
We have a range of services to assist in implementation. Our standard 5 day quick start services cover, data workshop - to understand requirements, configuration of the platform - creation of specific data fields, installation and training - on site with the ability to conduct over video conference and record each session for future playback. We also have user guides and video tutorials on our support web site.
Service documentation
Documentation formats
Other documentation formats
Online on our support site
End-of-contract data extraction
All data can be easily exported by Administration users at any time. It’s a very straight forward process.
End-of-contract process
We can export data to a flat file (csv file) or the user can export the data as required.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Main platform can be browsed to on any type of device, mobile phone/tablet/laptop/desktop pc. The platform is scalable and will dynamically scale and menu's change to scale to the device being used. We also provide a dedicated Android App free to download from the Google Play Store.
Service interface
Description of service interface
A data staging area in the main portal allows you to view all users data from Android app. Data can be pushed in real time or there is an offline mode where no connectivity exists.
Accessibility standards
None or don’t know
Description of accessibility
Site generated using HTML 5 - no specific browser or OS plugins required. Graceful degredation, so site is accessible and usable without JavaScript.
Accessibility testing
What users can and can't do using the API
We provide a RESTful API allowing access to all major models and properties, including Assets, Products, and Locations. Enumerations, additions, updates and removals are performed using standard HTTP requests (GET, PUT, PATCH etc).
API documentation
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Customisation available
Description of customisation
The platform has been developed to be highly configurable by the user. Access to our API's and advanced configuration of the platform is available through an Advanced Admin section in the platform, this is controlled by user permissions and we recommend at least 2 users are set as Administrators with training on this.


Independence of resources
At the highest level, individual client deployments can be made on private/public clouds to ensure a specific level of resource for a client. Platform and application services use several methods for load balancing and traffic management. Services are containerised using cgroups, so resource usage can be limited at the kernel level for each process. In addition, containerisation can be easily spread across multiple servers to ensure scalability if additional resources are required.


Service usage metrics
Metrics types
Reports are available out of the box in the platform and these can show volume of users using the platform, stats around volume of locations/assets/volume of change conducted and many other detailed metrics. All reports can be saved as templates to run on any location
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Less than once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other data at rest protection approach
AWS provides encryption-at-rest of data. On-site installations can use physical media that is encrypted.
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Simple process of either exporting spreadsheet/live table view data - this can be exported to csv or pdf, floorplans and visual data can be exported to PDF, SVG or Jpeg
Data export formats
Data import formats
  • CSV
  • Other
Other data import formats
  • DWG
  • PDF
  • Visio

Data-in-transit protection

Data protection between buyer and supplier networks
Other protection between networks
Private cloud network available, all site/API access through TLS1.2 SSL
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
If using public cloud (maintained by ourselves) and underlying service availability falls below 97%, users are credited 10% of their monthly cost to be used towards future services. In-house installations subject to restricctions placed on support and services by client.
Approach to resilience
Public/private clouds built upon one of the largest service-provider infrastructures (AWS), providing a high in-built level of replication and redundancy in data storage via EBS and RDS filesystems. Frontend and database services distributed across 6 UK and Ireland data centers. Platform can be distributed across multiple servers within these data-centres to ensure if virtual servers of data centre network issues prevent access, services are still accessible via other data centres.
Outage reporting
Users are notified of any planned maintenance events, which could impact upon service, via e-mail.

Identity and authentication

User authentication needed
User authentication
Other user authentication
2-factor TOTP authentication, username and password
Access restrictions in management interfaces and support channels
Configurable permissions system (users/groups) allowing access to different parts of the system. "Setup" system for administration, again limited by permissions. "Advanced Admin" system for advanced administrators, allowing access to configuration/lower-level operations. Permissions also apply to external API.
Access restriction testing frequency
At least once a year
Management access authentication
Description of management access authentication
2-factor TOTP authentication, username and password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Security Governance is documented in our personnel handbooks and is updated annually. We take security of customer data seriously and work upon request to the customer desired levels of security.
Information security policies and processes
We follow industry standard policies including Information Security Policies around confidentiality, integrity and availablility. All customer data held is done in line with agreed standards that the customer is happy with during initial contract discussions. Our Cloud provider has multiple levels of security we can adopt as required.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Our configuration control focuses on the specifications of both the deliverables and the processes. Change control is focued on identifying, documenting and controlling changes to the project and the project baselines. A change management plan documents how changes will be monitored and controlled throughlout the life-cycle of the project.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
In-built tools scanning for threats and vulnerabilities from our cloud provider. Utilising external contractors for penetration testing/vulnerability scanning to prevent threats. Threats rated as : CRITICAL = issues resolved as top priority, HIGH = These issues should be resolved as a priority, MEDIUM = Issues could potentially lead to a full breach of security but are lower risk, LOW = Issues do not present and immediate threat but do still present a security issue. Patches are deployed after thorough testing on a Development environment internally. Potential threat information is sourced from hosting provider and working closely with our customer base.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We monitor risks of attack from outside our organisation by following the process: Detect Attacks: Inside or outside our organisation - this looks at targeted attacks against technical infastructure and services being run.React to attacks: A proactive response to an attack after first being aware an attack has happened. A fast response is essential to stop an attack and mitigate risk. Understanding: Understanding how users and systems are used enables effective monitoring of systems and spot potential attacks. Response times will be dependant on the threat severity, CRITICAL to LOW rating response times are matched according to level of threat.
Incident management type
Supplier-defined controls
Incident management approach
Our incident management approach is used by our team to respond to unplanned events or service interuptions and ensure we quickly restore service to operational state. Our stages of tracking incidents involve: 1. Incident detections, 2. Triage/Prioritise and support, 3. Investigate&diagnose, 4. Resolution, 5. Lessons learned. We have an internal and external support site for logging support tickets and this allows users to self triage the severity of an incident/issue. . Incident reports are circulated either back through the associated ticket when raised on our support site or directly through project reports and risk log held/managed by our project manager.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£12,480.00 a licence a year
Discount for educational organisations
Free trial available
Description of free trial
Limited 7 day proof of concept, full access to the platform and mobile app.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.